Abstract: Systems and methods for the relative phase measurement and alignment of 66B encoded signals include receiving a plurality of 66B encoded signals each comprising sync headers which are periodically converted, determining a phase of each of the plurality of 66B encoded signals based on the periodically converted sync headers, and aligning the phase of each of the plurality of 66B encoded signals based on the determining. The periodically converted sync headers can include changing one of a first bit and a second bit of the sync header. A period of the periodically converted sync header can be set at twice a phase difference which is compensated at an egress point of the plurality of 66B encoded signals.

Abstract: Embodiments of the present invention provide a method for implementing P2MP multicast, a network node, and a system. The method includes: acquiring, by a network-side leaf node, an mLDP label of a downstream user-side leaf node and FEC information from an mLDP mapping message of the downstream user-side leaf node, then sending an mLDP mapping message that includes an mLDP label and the FEC information, to an upstream network-side root node, and generating a forwarding entry; searching for or establishing an RSVP P2MP LSP, allocating a label to the FEC information, and associating a forwarding entry of each network-side leaf node with the label of the FEC information; and sending an mLDP label of the network-side root node and the FEC information to an upstream user-side leaf node, and associating the mLDP label with the RSVP P2MP LSP and the label of the FEC information.

Abstract: An apparatus includes a memory and a processor operatively coupled to the memory. The processor is configured to partition a set of ports of an optical multiplexer into a set of port groups including a first port group having a first set of ports and a second port group having a second set of ports mutually exclusive from the first set of ports. The processor is configured to associate the first port group with a first router and associate the second port group with a second router. When the optical multiplexer is operatively coupled to the first router and the second router, the first router is operatively coupled to the optical multiplexer via the first set of ports and not the second set of ports, and the second router is operatively coupled to the optical multiplexer via the second set of ports and not the first set of ports.

Abstract: The system and method of the present disclosure relates to technology for a network system supporting multiple topology transparent zones (TTZs) on an edge node. TTZs have a topology including TTZ nodes consisting of edge nodes and internal nodes connected together by internal links. The edge nodes may also be connected to external nodes outside of the TTZ. The edge node is responsible for generating and distributing link state advertisements (LSAs) to generate virtual paths from the edge node to other edge nodes in each of the TTZs. Each TTZ sharing the edge node and each external node neighboring one of the other edge nodes of the TTZs is virtualized by distribution of the LSAs. However, the internal topology of each TTZ is concealed from each of the other TTZs sharing the edge node and from any neighboring external node connected to one of the other edge nodes.

Abstract: Example methods are provided for a first endpoint to communicate with a second endpoint over a public network, the second endpoint being in a private network. The method may comprise detecting an offload segment from a protocol stack of the first endpoint. The offload segment may be destined for the second endpoint, generated by the protocol stack from a chunk of data sent by an application executing on the first endpoint and detected using a virtual adapter that emulates a transport protocol task offload. The method may further comprise processing the offload segment to generate a processed offload segment for transfer through a tunnel connecting the virtual adapter over the public network with a gateway associated with the private network; and sending the processed offload segment through the tunnel in a plurality of tunnel segments, the gateway being configured to generate a plurality of transport protocol segments.

Abstract: Systems, methods, and software described herein provide enhancements for deploying applications in satellite systems. In one example, a satellite system comprises a communication interface configured to receive software payloads, and a satellite control system configured to operate logistical control elements of the satellite system. The satellite system further comprises a virtualized execution system configured to execute ones of the software payloads deployed on the satellite system as associated virtual nodes that share resources of the satellite system.

Abstract: Provided are systems and methods for a storage bridge device for communicating with network storage. In some implementations, the storage bridge device includes a network interface. The network interface may be configured to communicate with a storage device, using a storage device protocol. In some implementations, the storage bridge device includes a bus interface. The bus interface may be configured to communicate with a storage device, using a storage device protocol. In some implementations, the storage bridge device may be configured to communicate with a host device connected to the network. In these implementations, the storage bridge device may be configured to translate a request from the host device from the network protocol to the storage device protocol. The storage bridge device may further be configured to transfer the translated request to the storage device.

Abstract: The present disclosure describes traffic forwarding in a network where a virtual local area network (VLAN) exists in multiple network sites that are geographically dispersed and connected via virtual links. A first edge device (ED) at a first site receives, from a second ED at a second site, information identifying a VLAN of the second ED through a virtual link. The VLAN identified in the information is an active VLAN of the second ED. An association between (i) the VLAN of the second ED and (ii) the virtual link through which the information is received from the second ED is recorded. When forwarding traffic to the VLAN of the second ED, it is determined the virtual link associated with the VLAN of the second ED is determined based on the recorded association and the traffic is forwarded via the determined virtual link.

Abstract: An infrared (IR) emission and reception circuit, which is composed of three parts, an IR transceiver circuit, a carrier-smoothed circuit, and a signal recognition circuit. The IR transceiver circuit receives an outside IR signal, converts it to an electrical signal, and then amplifies and shapes the electrical signal to form a carrier frequency read signal; the IR transceiver circuit also emits an IR signal outward. The carrier-smoothed circuit receives the carrier frequency read signal, filters out the carrier to form a carrier-smoothed signal, and outputs it to the signal recognition circuit. The signal recognition circuit receives the carrier-smoothed signal, and converts it to an IR recognition signal to output to the electronic-device processor. The electronic-device processor receives the carrier frequency read signal to recognize the carrier frequency of the outside IR signal, and also receives the IR recognition signal to learn IR control codes of the outside IR signal.

Abstract: A network switch includes a plurality of ports, a parser coupled to the plurality of ports, and a processor coupled to the ports and configured to process a received packet via one of the ports. The received packet includes a first header field, a second header field, and a destination header field, each of the first, second, and destination header fields including a TTL field. The parser is configured to decide a valid bit for each of the first header field, the second header field and the destination header field, based on an availability for each of the first header field, the second header field and the destination header field. The processor is configured to execute an instruction to cause content of a select one of the first or second header field's TTL field to be copied to the destination header field.

Abstract: In accordance with an example embodiment of the present invention, there is provided a method, comprising exchanging connectivity information, setting up a connection, determining that a correspondent node has at least one access in an inactive state, and transmitting a request to the correspondent node to activate at least one of the at least one access in an inactive state. The setting up may be done based on the exchanged connectivity information.

Abstract: Wide area transport networks for mobile Radio Access Networks, and methods of use are provided herein. An exemplary wide area transport network may include a plurality of network segments that include at least one wireline network and at least one wireless network communicatively coupled with one another. Each of the plurality of network segments may be configured to transmit at least one of a plurality of signals communicated between a baseband module and a wireless transceiver.

Abstract: The present disclosure provides a server having a processor-readable storage medium comprising a set of instructions for protocol request processing; and a processor in communication with the storage medium. The processor is configured to execute the set of instructions to provide a communication with a customer terminal through an online platform; receive a second protocol request sent from the customer terminal; determine if the server is processing a first protocol request sent from the customer terminal prior to the second protocol request; process the second protocol request when the server is not processing the first protocol; and discard the second protocol request when the server is processing the first protocol.

Abstract: Provided are a method, apparatus and system for measuring network packet loss, the method includes: acquiring data packet measurement information measured by at least one target logical port to a traffic stream, transmitting the data packet measurement information to a measurement control point, so that the measurement control point determine the condition of network packet loss according to the data packet measurement information. As a data collecting point acquires the data packet measurement information measured by at least one target logical port to the traffic stream, and uniformly transmits the data packet measurement information to the measurement control point, when multiple target logical ports respectively perform measurement to acquire respective data packet measurement information, the measurement control point uniformly determines condition of packet loss of the traffic stream.

Abstract: An intermediating network is adapted to intermediate between an originating network and a servicing network. A first set of communications addresses in the originating network that can be used to originate communications to the servicing network are identified. A second set of communications addresses in the servicing network that can be used to service communications originating in the originating network are identified. The first set of communications addresses and the second set of communications addresses are analyzed. Based on the analyzing, incompatibilities between the first set of communications addresses and the second set of communications addresses that would prevent a communication from one of the first set of communications addresses from reaching the second set of communications addresses are determined.

Abstract: A device may determine that a route is inactive. Information identifying the route may be stored in a forwarding plane portion of a forwarding table and a control plane portion of the forwarding table. The route may be associated with directing network traffic toward an endpoint network device. The device may remove the information identifying the route from the forwarding plane portion of the forwarding table without removing the information identifying the route from the control plane portion of the forwarding table based on determining that the route is inactive. The device may route network traffic based on the forwarding table after removing the information identifying the route from the forwarding plane portion of the forwarding table without removing the information identifying the route from the control plane portion of the forwarding table.

Abstract: A wireless access point (AP) configured to operate in accordance with both Wi-Fi and Long-Term Evolution (LTE-U) standards/protocols jointly schedules transmit opportunities for Wi-Fi and LTE-U frames. The AP assigns one of multiple, prioritized, Wi-Fi access categories to each Wi-Fi transmit frame based on a type of data in the transmit frame. The AP also assigns to each LTE-U transmit frame an LTE-U access category prioritized relative to the Wi-Fi access categories. The AP schedules Wi-Fi and LTE-U transmit opportunities for the Wi-Fi transmit frames and the LTE-U transmit frames, respectively, in the shared channel bandwidth based on the prioritized Wi-Fi and LTE-U access categories.

Abstract: A transceiver is designed to share memory and processing power amongst a plurality of transmitter and/or receiver latency paths, in a communications transceiver that carries or supports multiple applications. For example, the transmitter and/or receiver latency paths of the transceiver can share an interleaver/deinterleaver memory. This allocation can be done based on the data rate, latency, BER, impulse noise protection requirements of the application, data or information being transported over each latency path, or in general any parameter associated with the communications system.

Abstract: Methods, systems, and computer readable mediums for managing computing systems by a management orchestration module. An example method includes determining that a projected computing load placed on a management computing system by one or more existing tenant computing systems and a new tenant computing system exceeds a threshold computing load, and in response, configuring the new tenant computing system as a remote tenant of the management computing system by deploying remote management software onto the new tenant computing system.

Abstract: Systems, methods, and software described herein provide enhancements for deploying applications in satellite systems. In one example, a satellite system comprises a communication interface configured to receive software payloads, and a satellite control system configured to operate logistical control elements of the satellite system. The satellite system further comprises a virtualized execution system configured to execute ones of the software payloads deployed on the satellite system as associated virtual nodes that share resources of the satellite system.

Abstract: A device may receive a set of border gateway protocol labels via a set of corresponding border gateway protocol messages. A border gateway protocol label, of the set of border gateway protocol labels, may be associated with a label descriptor attribute. The label descriptor attribute being associated with providing information regarding a forwarding semantic associated with the border gateway protocol label. The device may select the border gateway protocol label for routing network traffic toward a network device associated with the border gateway protocol label based on the label descriptor attribute. The device may route the network traffic toward the network device based on the border gateway protocol label and after selecting the border gateway protocol label.

Abstract: A Common Public Radio Interface (CPRI) link involves using a protocol stack having a CPRI layer and an emulation layer to emulate a point to point link, to enable the CPRI link to operate over a packet switched network. The emulation layer can be a pseudowire emulation which encapsulates multiple CPRI frames in a packet with overhead. A multiplexing layer such as Internet Protocol (IP) or Multiprotocol Label Switching (MPLS) can be used, for sending the packet over an Ethernet network. The usual need for a point to point infrastructure for the CPRI link can be avoided and the CPRI link can be implemented over more complex but usually cheaper packet networks, thus reducing costs or enabling more widespread application over existing packet networks. This applies whether the packet network is dedicated to the CPRI link, or shared with other packets. It can be useful for distributed radio base stations.

Abstract: The present invention is directed to a method and system for controlling the state of an interactive application and controlling delivery of the interactive application to one or more users. The system of the present invention is a system for delivering an interactive application to one or more users of a communications network and may comprise an interactive application adapted to the communications network; a user access device adapted to receive said interactive application; control means for establishing parameters under which said interactive application is rendered on said user access device; and mediation means for establishing terms for the interaction between the at least one user and other users and the communications network.

Abstract: An embodiment of the present invention provides a method for transmitting a device to device (D2D) signal by a user equipment (UE) in a wireless communication system. The method comprises: generating a K bit codeword from N bit information; allocating the K bit codeword to a first block and a second block; performing interleaving in each of the first block and the second block; mapping the interleaved codewords of the first block and the second block to a plurality of symbols of a subframe and transmitting the codewords mapped to the symbols, wherein the size of the second block is determined according to the number of symbols related to a guard interval among the plurality of symbols.

Abstract: Dynamic forward error correction (FEC) setting is discussed in which the network determines a FEC percentage for each video segment of a video streaming service, based on consideration of the transfer length of the video segment and the allocated bandwidth. When the transfer length and allocated bandwidth reflect transmission of less than peak bandwidth, the network will determine a higher FEC percentage that uses the otherwise wasted bandwidth to transmit additional redundancy symbols. The additional redundancy symbols increase the error recovery rate when collisions occur between streaming video reception and page monitoring occasions of other networks in multi-network, multi-subscriber identification module (SIM) mobile devices. A network entity may then transmit the dynamic FEC percentage for each video segment in the file description table (FDT) associated with the video streaming service.

Abstract: Physical Layer and Data-Link Layer data are connected with Networking through Application Layer data/information to enable searching, sorting, and identification of novel relationships between signal sources and their contents. Metadata can be used at the Physical Layer in an optical fiber network, connecting with metadata generated at the Data Link Layer, connected to metadata generated at the Network to Application Layer. The Physical Layer metadata is obtained from configuration and provisioning data within an Intelligent Optical System. The Data-Link Layer metadata is obtained from a signal processing device. The Network through Application Metadata is obtained from a packet capture or flow capture probe. The metadata from all layers are linked in a data store such that the network traffic, passing through stream(s) in optical fiber(s) layer data are combined.

Abstract: This disclosure describes techniques for provisioning a CMTS to re-direct customer traffic into virtualized network functions (NFVs) service chains. This disclosure describes, in one example, techniques for providing linkage between DOCSIS service flows and NFV service chains in the DOCSIS provisioning system by embedding information within cable modem boot files used to configured cable modems within the broadband system. In one example, the techniques facilitate the definition of an NFV service-chain in the DOCSIS cable modem boot file provisioning system. A supported CMTS, CCAP or Edge Router intercepts and interprets the configuration to install packet classifiers that steer specific subscriber flows, as detailed in the DOCSIS cable modem boot file, through the service-chain.

Abstract: According to one embodiment, a method includes performing functionality of a management plane and a control plane for a switch system using a processor of an external host coupled to the switch system via one or more peripheral component interconnect express (PCIe) ports. The method also includes providing a direct memory access (DMA) facility between the external host and switching logic of the switch system. The switch system includes a PCIe interface block coupled to PCIe ports configured to couple to external PCIe devices. Also, the PCIe interface block includes logic configured to provide DMA for each PCIe lane thereof. The switch system also includes multiple switched Ethernet ports configured to couple to one or more external Ethernet devices and switching logic configured to switch between the multiple switched Ethernet ports and the PCIe ports using DMA and a local processor coupled to the PCIe interface block.

Abstract: Method for establishing a mobile terminated call between a Global System for Mobile Communications (GSM) test system and a GSM mobile transceiver device under test (DUT) with reduced signaling via a call control (CC) sublayer of layer 3.

Abstract: A method for communication includes receiving in a first communication interface input frames, which include data symbols that were derived by encoding respective characters, and further include one or more synchronization symbols having no corresponding characters. The characters from the data symbols are recovered, and the recovered characters are transmitted to a second communication interface by mapping the characters into communication frames and discarding the synchronization symbols. The characters are extracted from the communication frames in the second communication interface by synchronizing to the input frames independently of the synchronization symbols. The input frames are reconstructed in the second communication interface, including the data symbols and the synchronization symbols, by re-encoding the extracted characters.

Abstract: We disclose an interface device configured to inter-convert CPRI data frames and Optical Transport Units (OTUs). The interface device acquires frame synchronization by temporarily storing data in a buffer bank such that translated sync characters are placed at respective predetermined locations within the buffer bank. Each translated sync character represents, in the corresponding OTU, a respective sync character of a CPRI hyperframe. The interface device is configured to distinguish translated sync characters from payload-data words of identical value based on predetermined alignment, in the buffer bank, of data temporarily stored therein for conversion into the CPRI data format. The interface device advantageously enables multiplexing of a plurality of CPRI links and aggregation and encapsulation of the multiplexed CPRI data into a stream of OTUs for transmission to the intended destination over an Optical Transport Network.

Abstract: Systems, methods, and software described herein provide enhancements for deploying applications in satellites. In one example, a satellite may receive software applications capable of execution as virtual nodes on the satellite, and receive a resource schedule associated with the software applications. The satellite may further execute the software applications on the satellite based on the resource schedule, wherein the resource schedule allocates processing resources and user sensor resources to the software applications.

Abstract: A network bridge connects a host device, such as digital media player, cell phone or camera, to content sources over a network to permit the host device to transmit or receive digital media. The network bridge includes a network interface module that identifies at least one media source as well as digital media available on the network. A host device interface module receives, from the host device, file system requests in accordance with a protocol, such as a mass storage protocol. In response to the request, a host device protocol interface module on the network bridge translates the file system request to a request for digital media. The network interface module acquires digital media from the media source, and the host device interface module transfers the digital media to the host device in accordance with the interface protocol.

Abstract: A first peer device connects to a first mesh network, which does not have the second peer device. The first peer device transmits a request for the content to a third peer device over the first mesh network. In response to the request, the first peer device receives, from the third peer device, the identity of the second peer device and the identity of the file containing the content. The third peer device also creates a tracker representing the request. Subsequently, the third peer device connects to the second peer device over another mesh network (to which the first peer device may not be connected) and indicates to the second peer device that the first peer device has requested the file. The first peer device then connects to the second peer device over another mesh network and receives the file from the second peer device.

Abstract: A system (87; FIG. 2) is disclosed to provide a Time Division Multiple Access Passive Optical Network to a Plastic Optical Fiber to be used in both single-family home networks and in multiple dwelling units. The system (87) extends the fiber to the home fiber network infrastructure from existing fiber access networks to fiber in the home for home networking. A plastic optical fiber converter (48; FIG. 4) associated with an optical network terminal (56; FIG. 6) receives a downstream optical signal (15; FIG. 3) that is converted into an electrical signal (61; FIG. 6). The converter (48) within the optical network terminal (56) modulates Ethernet frames contained within the electrical signal and converts the frames into optical signals (71,72; FIG. 6) with advanced modulations that are then transmitted via the plastic optical fiber within the home network (124; FIG. 2).

Abstract: Logic may compress wireless communications frames and communicate compressed frames that do not include the duplicative bit sequences within the packet flow. Logic may include the compressed frames in flow frames. Logic may generate, encode, transmit, decode, parse, and interpret flow frames after a packet flow is created. Flow frames may comprise a flow frame control field, a compressed frame, and a frame sequence check. Logic may decompress the compressed flow frame based upon flow decompression rules associated with a flow index of the flow frame. Flow frames may include a duration field to set the network allocation vectors of other stations. And the frame sequence check may be generated based upon the entire flow frame.

Abstract: PCI Express is a Bus or I/O interconnect standard for use inside the computer or embedded system enabling faster data transfers to and from peripheral devices. The standard is still evolving but has achieved a degree of stability such that other applications can be implemented using PCIE as basis. A PCIE based interconnect scheme to enable switching and inter-connection between multiple PCIE enabled systems each having its own PCIE root complex, such that the scalability of PCIE architecture can be applied to enable data transport between connected systems to form a cluster of systems, is proposed. These connected systems can be any computing, control, storage or embedded system. The scalability of the interconnect will allow the cluster to grow the bandwidth between the systems as they become necessary without changing to a different connection architecture.

Abstract: A mechanism for providing centralized message notification for user interface. disclosed. A method includes intercepting a plurality of message notifications. The plurality of message notifications are generated in an operating system and an application. The method also includes comparing content of a message corresponding to one of the plurality of message notifications with a plurality of regexp based rules. Each of the regexp based rules comprise a condition that is regexp based. When the content of the message matches with a matching regexp based rule of the plurality of regexp based rules, determining whether the condition in the matching regexp based rule is associated with a black list rule. The black list rule comprises excluding one or more of the message notifications among the plurality of message notifications indicated by a user to be displayed at a user device.

Abstract: A method carried out by a network node for sending update messages to a server when a predefined event occurs or periodically. The network node comprises a plurality of network interfaces. The update message is embedded with a unique identifier corresponding to the network node, and a network interface identifier corresponding to at least one of the plurality of network interfaces. In particular, the network interface identifier is corresponding to network interface(s) at which a predefined event has occurred. The present invention further comprises a method carried out by a server for resolving a DNS request by retrieving DNS resource records of a network node and/or network interface specified in the DNS request, and replying to the DNS request with the DNS resource records. The DNS resource records are created based on in part at least one update message received from the network node.

Abstract: The present disclosure relates to a base station in a cellular communication network and methods of operation thereof. In one embodiment, a base station determines that the base station is transitioning to an unavailable state. The base station then notifies one or more radio network nodes with which the base station conducts base-station-to-node communication that the base station is unavailable. Thereafter, in one embodiment, the one or more radio network nodes cease communication attempts with the base station. In this manner, the radio network nodes can avoid spending additional resources on attempts to re-establish communication connections to base stations that tend to be offline more often (e.g., low-power base stations (LP-BSs)).

Abstract: Communicating is disclosed. A first communication associated with a first mechanism for configuring a pseudo-wire is received. The first communication is transformed into a second communication, where the second communication is associated with a second mechanism for configuring a pseudo-wire. The second communication is transmitted, where a pseudo-wire that is configured using the second communication is associated with (1) a first node that is configured to support the first mechanism and (2) a second node that is configured to support the second mechanism.

Abstract: Example techniques of the present disclosure provide a first computing device comprising one or more processors and at least one module operable by the one or more processors to output, to a second computing device, a first set of HDLC protocol data units in accordance with a first format in which each of the first set of HDLC protocol data units includes a start-of-frame indicator, a length indicator, a data portion, and an end-of-frame indicator. The module may be further operable by the one or more processors to determine an inability of the second computing device to process at least one of the first set of HDLC protocol data units and output a second set of HDLC protocol data units in accordance with a second format in which each of the second set includes the data portion, a checksum portion, and the end-of-frame indicator and excludes the length indicator.

Abstract: A protection against an unsolicited communication for an IMS (PUCI) system includes a call session control function (CSCF), and a plurality of PUCE application servers. The PUCI application servers make an evaluation as to whether a communication received from the user equipment is an unsolicited communication; the CSCF makes a decision on routing toward the PUCI application servers based on the evaluation; then, the PUCI application servers execute the routing based on the decision.

Abstract: Base stations with coordinated multiple air-interface operations are provided. In some embodiments, multi-mode base station (BTS) systems operate with different air-interfaces, functionality, or configurations in a coordinated manner. For example, typical applications of such systems can include Macrocell BTS, Picocell BTS, Femtocell BTS, or Access Point (AP), Set Top Box (STB), or Home Gateway, Hot Spot Devices, User Terminal with the capability to perform required base station operations. In some embodiments, various techniques are provided for system improvements and optimizations via radio resource management, including user and system throughput optimization, QoS improvement, interference management, and various other improvements and optimizations. In some embodiments, a system (e.g.

Abstract: An embodiment method of loop suppression in a layer-two transit network with multiprotocol label switching (MPLS) encapsulation includes receiving a packet at a provider edge (PE) router for the layer-two transit network. The packet is stored in a non-transitory memory on the PE router. The packet is stored according to a packet data structure having an MPLS label field and a layer-two header. A time-to-live (TTL) attribute is then determined for the packet. The TTL attribute is written to the non-transitory memory in the MPLS label field. The packet is then routed according to information in the layer-two header.

Abstract: At least a method for verifying the authenticity of one or more authentication messages in an authentication procedure between a network and a mobile device is described wherein the method comprises: sending an authentication request through a first radio access node to a said mobile device, said radio access node being associated with first location information; said mobile device generating second location information associated with the location of said mobile device; and, verifying the authenticity of the origin of said authentication request by checking if said second location information comprises said first location information.

Abstract: An example method is provided and includes receiving a request from a mobile node for an Internet protocol (IP) address and establishing a point-to-point (PPP) link for the mobile node. The method also includes provisioning a first tunnel associated with a first communication flow for the mobile node, and provisioning a sub-tunnel with the first tunnel for a second communication flow. The second communication flow is associated with a high priority type of data to be transported on the sub-tunnel. In more specific embodiments, a call admission control (CAC) mechanism is used to establish the sub-tunnel with the first tunnel for the second communication flow. Additionally, an inner label is installed in a header of a packet associated with the second communication flow in order to identify the sub-tunnel.

Abstract: According to one embodiment, a switch system includes an external host connected via a peripheral component interconnect express (PCIe) port to a switch system, the external host being configured to perform functionality of a management plane and a control plane for the switch system, the external host having a processor. In another embodiment, a computer program product includes a computer readable storage medium having computer readable program code embodied therewith, the computer readable program code including computer readable program code configured to perform functionality of a management plane and a control plane for a switch system using a processor of an external host. Other systems, computer program products, and methods are described according to more embodiments.

Abstract: A network switch includes a plurality of ports, a parser coupled to the plurality of ports, and a processor coupled to the ports and configured to process a received packet via one of the ports. The received packet includes a first header field, a second header field, and a destination header field, each of the first, second, and destination header fields including a TTL field. The parser is configured to decide a valid bit for each of the first header field, the second header field and the destination header field, based on an availability for each of the first header field, the second header field and the destination header field. The processor is configured to execute an instruction to cause, based on the valid bits of the first and second header fields, content of a select one of the first or second header field's TTL field to be copied to the destination header field.